A vulnerability has been found in FAST/TOOLS provided by Yokogawa Electric Corporation.



The web server accepts
the OPTIONS method. An attacker could potentially use this information to carry
out other attacks.



The
affected products and versions are as follows: FAST/TOOLS (Packages: RVSVRN, UNSVRN, HMIWEB, FTEES, HMIMOB) R9.01 to
R10.04

Project Subscriptions

Vendors Products
Yokogawa Subscribe
Fast/tools Subscribe
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Mon, 09 Feb 2026 11:00:00 +0000

Type Values Removed Values Added
First Time appeared Yokogawa
Yokogawa fast/tools
Vendors & Products Yokogawa
Yokogawa fast/tools

Mon, 09 Feb 2026 03:30:00 +0000

Type Values Removed Values Added
Description A vulnerability has been found in FAST/TOOLS provided by Yokogawa Electric Corporation. The web server accepts the OPTIONS method. An attacker could potentially use this information to carry out other attacks. The affected products and versions are as follows: FAST/TOOLS (Packages: RVSVRN, UNSVRN, HMIWEB, FTEES, HMIMOB) R9.01 to R10.04
Weaknesses CWE-358
References
Metrics cvssV4_0

{'score': 2.1, 'vector': 'CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:A/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: YokogawaGroup

Published:

Updated: 2026-02-09T03:15:41.396Z

Reserved: 2025-12-05T05:04:18.583Z

Link: CVE-2025-66603

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-02-09T04:15:49.550

Modified: 2026-02-09T04:15:49.550

Link: CVE-2025-66603

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-02-09T10:39:25Z

Weaknesses